๐ CIS Controls โ The Center for Internet Security
The Center for Internet Security (CIS) provides globally recognised best practices for securing IT systems and data. Their most notable framework is the CIS Controls โ a prioritised set of actions that help organisations protect themselves against the most pervasive cyber threats.
โ What is CIS?
CIS (Center for Internet Security) is a non-profit organisation that provides cybersecurity standards and benchmarks, used worldwide to harden systems and improve cyber hygiene. Their mission is to โmake the connected world a safer place.โ
Their flagship offering is:
- CIS Controls โ a set of 18 critical security controls
- CIS Benchmarks โ secure configuration baselines for systems, software, and cloud environments
๐งฐ What are the CIS Controls?
The CIS Critical Security Controls (v8) are grouped into three implementation groups (IG1, IG2, IG3), depending on organisational maturity and risk.
| Group | Description |
|---|---|
| IG1 (Basic) | Foundational cyber hygiene โ ideal for small/medium organisations |
| IG2 (Standard) | Adds depth โ suited to organisations with moderate resources and risks |
| IG3 (Advanced) | Designed for mature orgs with complex systems and significant risks |
๐ CIS Control Categories (v8)
The 18 controls are:
- Inventory and Control of Enterprise Assets
- Inventory and Control of Software Assets
- Data Protection
- Secure Configuration of Enterprise Assets and Software
- Account Management
- Access Control Management
- Continuous Vulnerability Management
- Audit Log Management
- Email and Web Browser Protections
- Malware Defences
- Data Recovery
- Network Infrastructure Management
- Security Awareness and Skills Training
- Security Operations Centre (SOC)
- Service Provider Management
- Application Software Security
- Incident Response Management
- Penetration Testing
Each control includes safeguards (formerly sub-controls) that detail actionable steps, and each is mapped to risk areas and other frameworks like NIST CSF, ISO 27001, and PCI DSS.
๐ Why Use CIS Controls?
- Prioritised: Focuses first on high-impact, achievable defences
- Actionable: Clear, practical steps for implementation
- Mappable: Aligns with other security standards (NIST, ISO, etc.)
- Free: Publicly available and supported by a global community
๐ ๏ธ How to Use CIS in Your Organisation
- Download the CIS Controls & Benchmarks
Get them from the official site: https://cisecurity.org - Conduct a Gap Assessment
Compare your current state against each control and its safeguards. - Prioritise by Implementation Group
Start with IG1 if you’re a small or new organisation. Mature companies should aim for IG2 or IG3. - Apply CIS Benchmarks
Harden operating systems, cloud, and software (e.g. Windows 10, Ubuntu, AWS) using step-by-step CIS benchmark guides. - Track Progress
Use tools like the CIS Controls Assessment Tool (CIS-CAT) to monitor improvements.
๐ง Tools That Support CIS
- CIS-CAT Pro (assessment and scoring tool)
- Microsoft Defender, CrowdStrike, Tenable, etc., map detections to CIS Controls
- Cloud providers like AWS, Azure, GCP support CIS benchmarks as compliance standards
๐ฆ Where to Get It
๐ก๏ธ Summary
Implementing CIS Controls is one of the most effective ways to improve your cybersecurity posture quickly and systematically. Whether you’re a small business or an enterprise, CIS gives you a roadmap to reduce risk and meet compliance obligations.